Analysis
-
max time kernel
155s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2024, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
a9e8a93be771120a8e1fb06e01130043.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9e8a93be771120a8e1fb06e01130043.exe
Resource
win10v2004-20240226-en
General
-
Target
a9e8a93be771120a8e1fb06e01130043.exe
-
Size
82KB
-
MD5
a9e8a93be771120a8e1fb06e01130043
-
SHA1
073eaf7d3bf06b8b5870e143d8044644f07ff2c3
-
SHA256
de12c67c262eb59ed8fa7b64622c0b977804a646c3606bbd96af16c05aed1a7d
-
SHA512
8bee256428f23c5f9e5769fa64918d276b8a33e50a57ec28a6ba1bacb44526de710cb075aa5ec2dbdc52d67b3f91513345edfacfaba45b4f470c0a14422ddb28
-
SSDEEP
1536:snoNJ7xWuN7TMQ/BV1RfcwZikeJ1Ku49nhCi0ol17zrw2gsBFJ:soNRRN3PkweJ1KTnwwvw2JBL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3060 a9e8a93be771120a8e1fb06e01130043.exe -
Executes dropped EXE 1 IoCs
pid Process 3060 a9e8a93be771120a8e1fb06e01130043.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4480 a9e8a93be771120a8e1fb06e01130043.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4480 a9e8a93be771120a8e1fb06e01130043.exe 3060 a9e8a93be771120a8e1fb06e01130043.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4480 wrote to memory of 3060 4480 a9e8a93be771120a8e1fb06e01130043.exe 95 PID 4480 wrote to memory of 3060 4480 a9e8a93be771120a8e1fb06e01130043.exe 95 PID 4480 wrote to memory of 3060 4480 a9e8a93be771120a8e1fb06e01130043.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9e8a93be771120a8e1fb06e01130043.exe"C:\Users\Admin\AppData\Local\Temp\a9e8a93be771120a8e1fb06e01130043.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\a9e8a93be771120a8e1fb06e01130043.exeC:\Users\Admin\AppData\Local\Temp\a9e8a93be771120a8e1fb06e01130043.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4052 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:772
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD50c4f0ea4859b5e629af49b72c39e66e3
SHA18a38711c8c56e993618a88a7fe1a28a729f1711b
SHA256c68e1fb8daa1775436bc2f12bb9a2f8b5b64da61800689abc28744341656a63d
SHA51216f3f37df42b4455eccac30a3cf373fe73847a9317b1b31cdd8d8784345a7d49359a79b14b9643da8262a4f603847412f962d592f65a1680ac84290605eb7691